Sciweavers

334 search results - page 55 / 67
» Survey of trust models in different network domains
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Tuning Skype's Redundancy Control Algorithm for User Satisfaction
—Determining how to transport delay-sensitive voice data has long been a problem in multimedia networking. The difficulty arises because voice and best-effort data are different...
Te-Yuan Huang, Kuan-Ta Chen, Polly Huang
ICDCS
1991
IEEE
13 years 11 months ago
Supporting the development of network programs
of ‘‘network computers’’ is inherently lessAbstract predictable than that of more traditional distributed memory systems, such as hypercubes [22], since both theFor computa...
Bernd Bruegge, Peter Steenkiste
ICUMT
2009
13 years 5 months ago
Simulation analysis of Bluetooth Piconets self-disturbance in industrial applications: A case study
- Wireless systems operating in the 2.4 GHz ISM frequency band and sharing the same environment in an industrial environment are likely to interfere with each other due to simultan...
Muhammad Kamran Khan, Ahmad Ali Tabassam, Farhan A...
VIZSEC
2005
Springer
14 years 1 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
DRM
2006
Springer
13 years 11 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...